US10384642B2 - Methods and systems for vehicle theft detection and prevention using a smartphone and video-based parking technology - Google Patents

Methods and systems for vehicle theft detection and prevention using a smartphone and video-based parking technology Download PDF

Info

Publication number
US10384642B2
US10384642B2 US13/944,177 US201313944177A US10384642B2 US 10384642 B2 US10384642 B2 US 10384642B2 US 201313944177 A US201313944177 A US 201313944177A US 10384642 B2 US10384642 B2 US 10384642B2
Authority
US
United States
Prior art keywords
vehicle
user
video stream
theft
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active, expires
Application number
US13/944,177
Other versions
US20150022663A1 (en
Inventor
Yao Rong Wang
Michael Furst
Panya Chanawangsa
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Conduent Business Services LLC
Original Assignee
Conduent Business Services LLC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Conduent Business Services LLC filed Critical Conduent Business Services LLC
Assigned to XEROX CORPORATION reassignment XEROX CORPORATION ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: CHANAWANGSA, PANYA, FURST, MICHAEL, WANG, YAO RONG
Priority to US13/944,177 priority Critical patent/US10384642B2/en
Publication of US20150022663A1 publication Critical patent/US20150022663A1/en
Assigned to CONDUENT BUSINESS SERVICES, LLC reassignment CONDUENT BUSINESS SERVICES, LLC ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: XEROX CORPORATION
Publication of US10384642B2 publication Critical patent/US10384642B2/en
Application granted granted Critical
Assigned to JPMORGAN CHASE BANK, N.A. reassignment JPMORGAN CHASE BANK, N.A. SECURITY AGREEMENT Assignors: CONDUENT BUSINESS SERVICES, LLC
Assigned to CONDUENT CASUALTY CLAIMS SOLUTIONS, LLC, ADVECTIS, INC., CONDUENT HEALTH ASSESSMENTS, LLC, CONDUENT BUSINESS SOLUTIONS, LLC, CONDUENT TRANSPORT SOLUTIONS, INC., CONDUENT BUSINESS SERVICES, LLC, CONDUENT STATE & LOCAL SOLUTIONS, INC., CONDUENT COMMERCIAL SOLUTIONS, LLC reassignment CONDUENT CASUALTY CLAIMS SOLUTIONS, LLC RELEASE BY SECURED PARTY (SEE DOCUMENT FOR DETAILS). Assignors: JPMORGAN CHASE BANK, N.A.
Assigned to BANK OF AMERICA, N.A. reassignment BANK OF AMERICA, N.A. SECURITY INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: CONDUENT BUSINESS SERVICES, LLC
Assigned to U.S. BANK, NATIONAL ASSOCIATION reassignment U.S. BANK, NATIONAL ASSOCIATION SECURITY INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: CONDUENT BUSINESS SERVICES, LLC
Active legal-status Critical Current
Adjusted expiration legal-status Critical

Links

Images

Classifications

    • BPERFORMING OPERATIONS; TRANSPORTING
    • B60VEHICLES IN GENERAL
    • B60RVEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
    • B60R25/00Fittings or systems for preventing or indicating unauthorised use or theft of vehicles
    • B60R25/10Fittings or systems for preventing or indicating unauthorised use or theft of vehicles actuating a signalling device
    • B60R25/102Fittings or systems for preventing or indicating unauthorised use or theft of vehicles actuating a signalling device a signal being sent to a remote location, e.g. a radio signal being transmitted to a police station, a security company or the owner
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/18Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
    • G08B13/189Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
    • G08B13/194Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
    • G08B13/196Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
    • G08B13/19602Image analysis to detect motion of the intruder, e.g. by frame subtraction
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/18Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast
    • H04N7/183Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast for receiving images from a single remote source

Definitions

  • Embodiments are generally related to the field of automatic anomaly detection. Embodiments also relate to the prevention of vehicle theft and vandalism. Embodiments are also related to video-based parking technologies. Embodiments further relate to parking management and transportation systems.
  • Automobile theft detection and prevention is currently accomplished in a number of ways.
  • theft prevention systems can be installed in vehicles.
  • the development of a vehicle security system for protecting a vehicle from theft while the vehicle is unattended in a parking position is typically the vehicle manufacturer's responsibility.
  • Vehicle manufacturers' solutions typically involve adding hardware or a software component to the vehicle. As this increases the cost of the vehicle, not every vehicle is equipped with such a system.
  • Another solution involves simply parking in a secured location and asking someone to watch or attend to the vehicle. Access to information that shows which parking locations are safer than others, however, is not always available. Therefore, finding a secure site in which to park is not always possible and finding someone to watch a car is not necessarily cost effective based on the location, time of day, and length of time parked. This is particularly true when the parking location is on-street or curbside.
  • a video stream of a parking area wherein a vehicle is parked can be captured, the video stream provided by a theft notification service to which the vehicle is pre-registered.
  • the vehicle in the video stream can be identified.
  • the video stream is then analyzed to detect motion with respect to the vehicle. An alert can then be generated if motion is detected.
  • Embodiments can be implemented in the context of an “app” or service that is capable of alerting someone parking on a city street that their car has been moved without their permission.
  • This disclosed approach uses a mobile phone to allow a driver to register their vehicle for a theft notification system.
  • a video camera mounted with a view of the parking area on a street captures video streams.
  • a video processing system identifies objects (e.g., cars) and generates an alert when a car is moved without the user's acknowledgement, and the alert will be sent to the registered mobile device user.
  • the driver can then notify police with the registered vehicle information if they think the car is being stolen.
  • the police also can be sent the link for verification, enforcement, and prosecution.
  • Enhancement to the system include mobile applications that display theft statistics and pricing.
  • FIG. 1 illustrates a screenshot of an example parking “app” that can be implemented via a Smartphone or other computing device, in accordance with a preferred embodiment
  • FIG. 2 illustrates screenshots of three respective GUI displays, which are also displayable via a Smartphone such as shown in FIG. 1 , in accordance with a preferred embodiment
  • FIG. 3 illustrates additional GUI's displaying different user options, in accordance with a preferred embodiment
  • FIG. 4 illustrates example GUIs, which can be implemented with respect to the server side that takes the vehicle occupancy data from video detection data and compares it with the current occupancy data including the vehicles signed up with the theft and vandalism prevention service, in accordance with embodiment
  • FIG. 5 illustrates example “app” GUI's, which can be implemented in accordance with an alternative embodiment
  • FIG. 6 illustrates a high-level flow chart of operations depicting logical operational steps of a method for preventing theft, in accordance with a preferred embodiment
  • FIG. 7 illustrates a high-level flow chart of operations depicting logical operational steps of a method for preventing theft, in accordance with an alternative embodiment
  • FIG. 8 illustrates a schematic view of a computer system, which can be implemented in accordance with one or more of the disclosed embodiments.
  • FIG. 9 illustrates a schematic view of a software system including an anomaly detection module, an operating system, and a user interface, in accordance with one or more embodiments.
  • the disclosed embodiments utilize video-based parking technology to implement vehicle theft detection and prevention using elements of video based parking systems and smartphone/mobile device based applications.
  • This service can be offered to any vehicle parked within the context of such a video based parking system.
  • Advantages of this approach include: no additional HW/SW needs to be added to the vehicle itself, monitoring and detection of a wide variety of anomalous behavior can be achieved with no additional HW in the video based parking system, and many options for preventive action can be pursued because of the availability of live video that can be machine or human monitored in contrast to a simple “beeping horn” in a car-based system.
  • FIG. 1 illustrates a screenshot of an example parking “app” that can be implemented via a Smartphone or other computing device 10 , in accordance with a preferred embodiment.
  • the parking “app” can be part of an offering of a theft notification service.
  • the “app” itself functions to find an available parking spot, to find an available parking spot with available theft notification service, and to notify a user of a potential theft related to his or her vehicle, as will be explained in greater detail herein. As shown in FIG.
  • a Smartphone 10 displays a GUI (Graphical User Interface) that can include, for example, graphically displayed maps and directions and in some situations, turn-by-turn directions to a particular destination 12 along with, for example, 2D satellite and 3D earth views; along with in some instances, photographic views of the turns, which show the real streets and surroundings.
  • the data displayed via such a GUI can be derived from, for example, satellite mapping information and other geographical data.
  • app is an an abbreviation for “application”. An app is thus a piece of software. It can run on the Internet, on a computer, or on a mobile computing device or other electronic device.
  • FIG. 2 illustrates screenshots of three respective GUI displays 20 , 30 , and 40 , which are also displayable via a Smartphone such as shown in FIG. 1 , in accordance with a preferred embodiment.
  • FIG. 2 thus demonstrates how a user can register his/her vehicle by inputting his/her vehicle's information.
  • GUI 20 includes an input field 22 for entering a username and an input field 24 for entering a password to access the parking app.
  • Graphically displayed login button 26 and sign-up button 28 are also displayable via the GUI 20 .
  • GUI 30 To the right of GUI 20 is shown a subsequent GUI 30 that allows a user to enter additional account information into 32 , 34 , 36 after logging into the app via, for example, the login button 26 .
  • GUI 40 allows for the selection and/or identification of a number of different types of vehicle types (e.g., KIA, JAGUAR, etc.). Additional vehicle information (e.g., vehicle's color and model) can also be included in the registration process.
  • vehicle types
  • FIG. 3 illustrates additional GUI's 42 , 43 , and 60 displaying different user options, in accordance with a preferred embodiment.
  • GUI 42 offers a section 50 that displays user profile information including, for example, a parking status field 54 that displays parking information such as, for example “NOT PARKED.”
  • a section 48 can display vehicle profile information, which may be entered and altered by the user.
  • submission of this information can occur via, for example, a submit button 44 .
  • the user can sign out via sign out button 46 .
  • GUI 43 displays information and options similar to that shown in GUI 42 .
  • the status identifier 54 indicates “PARKED” as opposed to “NOT PARKED” shown in GUI 42 .
  • GUI 60 permits a user to enter and/or view personal information 64 and registration information 62 . Buttons 64 and 68 respectively allow a user to submit or cancel the entry or viewing of such information.
  • a user can sign up or login to the mobile parking application through a smartphone or other platform prior to parking as shown in FIG. 2 (e.g., see the login button 26 and the sign up button 28 ).
  • Information can be provided to the user to guide the user to parking locations where parking is available and video security is an option.
  • FIG. 1 shows the mobile parking space finding application that can guide users to the appropriate parking spot.
  • the safety and cost status for theft/vandalism can also be presented to reinforce the value of the option to the user.
  • Information will be provided stating whether security is an option the client pays for or included automatically as part of the parking service and fees.
  • the user's information such as vehicle type, vehicle color, license plate number, or the parking account number (if the user already has an account), etc., can be entered or retrieved from memory and populated in the application automatically. Many services paid or free are provided after login. Security monitoring is one such service.
  • the user is prompted to answer if he/she would like to have the vehicle theft and vandalism monitoring and prevention service added to their parking spot. If the user clicks “yes”, a unique ID code (such as the vehicle's license plate number or the parking account number) is created by the mobile parking application and sent to the server to register the vehicle and the services desired.
  • a unique ID code such as the vehicle's license plate number or the parking account number
  • the service can be initiated when the car is parked in an appropriate location.
  • the server with vehicle detection video analytics associates the code with the parking vehicle.
  • the vehicle's GPS location and starting parking time are enough to distinguish the vehicle from its neighboring parked vehicles.
  • other information such as the vehicle's color and size will be used for this association.
  • the video analytics is capable of detecting and recognizing license plate number (Ref. [5]), this association will be even easier.
  • the user After parking, the user is asked to confirm the “start of security” monitoring of the vehicle and, optionally, some confirming picture or info is presented to the user to confirm their vehicle is the proper one.
  • the video feeds which include the vehicle with the security option selected, are recorded for review if needed, and segmented and processed by video analytics including the theft detection software.
  • the vehicle detection video analytics will detect the vehicle's movement and an alarm will be sent to the user's smartphone.
  • the alert may include a question to ask the user whether the movement of his/her vehicle is authorized. If the user replies “yes”, no further action will be taken. If the user replies “no”, a theft event is detected.
  • police contact information can be attached to the alarm so that the user can directly contact the police. Recorded videos are also available for police to review. In case of a false alarm, the user can “click” away the alarm to let the server know.
  • the system can attempt several different mechanisms to contact the owner of the vehicle or item under secure observation in order to be robust vs. forgetting to turn off the security feature. After repeated alarms sent to the user without response, the server can initiate a call to police providing the location and vehicle information (maker, model, color, license plate number etc.) and a copy of the relevant video if desired by local police enforcement
  • the user can click a button from his/her smartphone to let the server know the end of the parking session.
  • the server will de-activate the created theft and vandalism prevention code and turn off the service.
  • the de-activation may only be done when the smartphone is near the vehicle's location or an “are you sure” check before turning off the service is required.
  • This service can be provided either based on the parking time monitored (as the video parking technology is capable of determining parking time) or each parking session. It could have tiers of services based on machine monitoring, human monitoring, and the aggressiveness of the actions taken in response to a detected event.
  • vehicle as utilized herein can refer to a variety of vehicles such as automobiles, trucks, bicycles, motorcycles, etc.
  • the disclosed embodiments can be implemented in, for example, a smartphone parking application with real time parking availability data inputting from cameras. Parking space finding and reservation as well as automatic parking bill payment are some of the functions that can be incorporated into the “app”. Security applications can be added on top of these functions.
  • FIG. 3 illustrates how a registered user can park his/her vehicle and then get billed later with exact parking time.
  • the user parks his/her car, he/she is required to initiate a parking session by logging into the application and pressing the submit button. In doing so, his/her account information, time stamp as well as the GPS coordinates are transmitted to the central server. If the user signed up for the vehicle stealing prevention service, the code created as described above can be sent together with all the other information shown.
  • FIG. 4 illustrates example GUIs 70 and 72 which can be implemented with respect to the server side that takes the vehicle occupancy data from video detection data and compares it with the current occupancy data including the vehicles signed up with the theft prevention service, in accordance with embodiment.
  • GUI's 70 and 72 illustrates a prototype of a web-based monitoring tool. The value “0” shown in the parking table of GUI 72 indicates that the vehicle does not have the theft prevention service and “1” means the prevention service is enabled (e.g., see the column labeled “Monitoring Service” in the parking table displayed via GUI 72 ).
  • FIG. 5 illustrates Smartphone app GUI's 74 , 76 , and 78 , which can be implemented in accordance with an alternative embodiment.
  • GUI 74 provides a filter for theft prevention monitoring service. When the filter in “on”, the user enabled the theft prevention and notification service. The user could select “off” even if he/she already registered with the theft prevention/notification service.
  • GUI 76 indicates that when the car is detected to have left the parking spot without the user deactivating the prevention service, a notification can be sent to the user (e.g., “Your car has been moved” and “Did you forget to end your parking session?”). If the user selects “No”, a dial pad can be presented to the user as shown via GUI 78 so that the user can conveniently call the police or an appropriate emergency service.
  • FIG. 6 illustrates a high-level flow chart of operations depicting logical operational steps of a method 80 for preventing theft, in accordance with a preferred embodiment.
  • the process can be initiated.
  • a server e.g., a theft prevention/notification server
  • receive a request for the theft prevention/notification service from a pre-registered vehicle user.
  • the request can be generated from, e.g., the smartphone app by enabling the theft prevention/notification filter in GUI 74 to “on”.
  • a step or logical operation can be implemented for capturing a video stream of a parking area wherein a vehicle is parked, the video stream is provided by the cameras that are deployed on the street for the video-based parking technology. Then, as depicted at block 88 , a step or logical operation can be implemented for identifying the vehicle in the video stream. Next, as described at block 90 , a step or logical operation can be implemented for analyzing the video stream to detect a motion with respect to the identified vehicle. Thereafter, as shown at block 92 , a step or logical operation can be implemented for generating an alert if the motion is detected. The process can then terminate, as shown at block 94 .
  • FIG. 7 illustrates a high-level flow chart of operations depicting logical operational steps of a method 81 for preventing theft/vandalism, in accordance with an alternative embodiment.
  • the method 81 is similar to the method 80 shown in FIG. 6 .
  • the same method steps/logical operations 82 to 92 are shown in both FIGS. 6-7 .
  • a description of such steps/logical operations will not be repeated.
  • a step or logical operation is depicted for allowing a server (e.g., a theft prevention/notification server) to receive the user response to the alert indicating whether the user authorizes the detected motion. If the user's response is not authorized, the next step or logical operation, as depicted by block 98 , is to provide contact information of law enforcement agents together with other vehicle information that helps stopping the theft. The process then terminates, as shown at block 100 .
  • a server e.g., a theft prevention/notification server
  • FIGS. 1, 2, 3, and 5 demonstrate screenshots from a Smartphone or mobile computing device “app.”
  • FIG. 4 demonstrates one example of a management tool offered by a theft prevention/notification server.
  • FIGS. 6-7 illustrates operational/logical steps and/or instructions of methods 80 , 81 . It will be understood that each block of the illustrations, and combinations of blocks, can be implemented by computer program instructions.
  • These computer program instructions may be provided to a processor of a general-purpose computer, special purpose computer, or other programmable data-processing apparatus to produce a machine such that the instructions, which execute via the processor of the computer or other programmable data-processing apparatus, create means for implementing the functions/acts specified in the block or blocks discussed herein such as, for example, the various instructions discussed and shown with respect to the figures herein.
  • These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data-processing apparatus to function in a particular manner such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function/act specified in the block or blocks.
  • the computer program instructions may also be loaded onto a computer or other programmable data-processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions/acts specified in the block or blocks.
  • FIGS. 8-9 are provided as exemplary diagrams of data-processing environments in which embodiments of the present invention may be implemented. It should be appreciated that FIGS. 8-9 are only exemplary and are not intended to assert or imply any limitation with regard to the environments in which aspects or embodiments of the disclosed embodiments may be implemented. Many modifications to the depicted environments may be made without departing from the spirit and scope of the disclosed embodiments. Note that FIGS. 8-9 generally illustrate a data-processing system in which embodiments may be implemented (e.g., such as an “app”). FIGS. 8-9 are thus representative of a variety of different types of data-processing systems and devices including, for example, servers, laptop computers, Smartphones, “pad” or tablet computing devices, desktop computers, and other computing devices.
  • a data-processing system 300 can include, for example, a central processor 301 (or other processors), a main memory 302 , a controller 303 , and in some embodiments, a USB (Universal Serial Bus) 304 or other appropriate peripheral connection.
  • System 300 can also include an input device 305 (e.g., a keyboard, pointing device such as a mouse, etc.), a display 306 , and a HDD (Hard Disk Drive) 307 (e.g., mass storage).
  • the various components of data-processing system 300 can communicate electronically through a system bus 310 or similar architecture.
  • the system bus 310 may be, for example, a subsystem that transfers data between, for example, computer components within data-processing system 300 or to and from other data-processing devices, components, computers, etc.
  • FIG. 9 illustrates a computer software system 350 , which may be employed for directing the operation of the data-processing system 300 depicted in FIG. 8 .
  • Software application 354 can be stored in memory 302 and/or on HDD 307 , and generally can include a module 352 and can be associated with a kernel or operating system 351 and a shell or interface 353 .
  • One or more application programs, such as module(s) 352 may be “loaded” (i.e., transferred from mass storage or HDD 307 into the main memory 302 ) for execution by the data-processing system 300 .
  • module 352 can be implemented as, for example, a software module that can perform the logical instructions or operations of FIGS. 6-7 and so forth.
  • the data-processing system 300 can receive user commands and data through user interface 353 accessible by a user 349 . These inputs may then be acted upon by the data-processing system 300 in accordance with instructions from operating system 351 and/or software application 354 and any software module(s) 352 thereof.
  • program modules can include, but are not limited to, routines, subroutines, software applications, programs, objects, components, data structures, etc., that perform particular tasks or implement particular abstract data types and instructions.
  • routines, subroutines, software applications, programs, objects, components, data structures, etc. that perform particular tasks or implement particular abstract data types and instructions.
  • module may refer to a collection of routines and data structures that perform a particular task or implements a particular abstract data type. Modules may be composed of two parts: an interface, which lists the constants, data types, variable, and routines that can be accessed by other modules or routines, and an implementation, which is typically private (accessible only to that module) and which includes source code that actually implements the routines in the module.
  • the term module may also simply refer to an application such as a computer program designed to assist in the performance of a specific task such as word processing, accounting, inventory management, etc.
  • the interface 353 (e.g., a graphical user interface) can serve to display results, whereupon a user may supply additional inputs or terminate a particular session.
  • operating system 351 and interface 353 can be implemented in the context of a “windows” system. It can be appreciated, of course, that other types of systems are possible. For example, rather than a traditional “windows” system, other operation systems such as, for example, a real time operating system (RTOS) more commonly employed in wireless systems may also be employed with respect to operating system 351 and interface 353 .
  • RTOS real time operating system
  • FIGS. 8-9 are thus intended as examples and not as architectural limitations of disclosed embodiments. Additionally, such embodiments are not limited to any particular application or computing or data-processing environment. Instead, those skilled in the art will appreciate that the disclosed approach may be advantageously applied to a variety of systems and application software. Moreover, the disclosed embodiments can be embodied on a variety of different computing platforms including Macintosh, Unix, Linux, and the like.
  • a method for preventing vehicle theft can be implemented.
  • Such a method can include the steps or logical operations of capturing a video stream of a parking area wherein a vehicle is parked, the video stream provided by a theft notification service to which the vehicle is pre-registered; identifying the vehicle in the video stream, analyzing the video stream to detect a motion with respect to the vehicle, and generating an alert if the motion is detected.
  • a vehicle can be, for example, an automobile, motorcycle, a motorized scooter, bicycle, etc.
  • a step or logical operation can be provided for registering the vehicle with the theft notification service via a computing device.
  • a step or logical operation can be provided for identifying the vehicle in the video stream using information provided by the registering of the vehicle with the theft notification service.
  • a step or logical operation can be provided for transmitting the alert regarding the motion to a mobile communications device of a user associated with the vehicle.
  • a step or logical operation can be provided for transmitting back a response from the user regarding the alert to indicate whether the user authorized the motion.
  • a step or logical operation can be provided for providing a link to a webpage associated with the theft notification service, wherein the webpage displays interactive data for verification, enforcement, and prosecution use by civil authorities.
  • the aforementioned motion can constitute an unauthorized movement of the vehicle.
  • a system for preventing vehicle theft can be implemented.
  • a system can include, for example, a processor, a data bus coupled to the processor, and a computer-usable medium embodying computer program code, the computer-usable medium being coupled to the data bus.
  • Such computer program code can include instructions executable by the processor and configured, for example, for capturing a video stream of a parking area wherein a vehicle is parked, the video stream provided by a theft notification service to which the vehicle is pre-registered, identifying the vehicle in the video stream, analyzing the video stream to detect a motion with respect to the vehicle, and generating an alert if the motion is detected.
  • such instructions can be further configured for registering the vehicle with the theft notification service via a computing device. In yet another embodiment, such instructions can be further configured for identifying the vehicle in the video stream using information provided by the registering of the vehicle with the theft notification service. In still another embodiment, such instructions can be further configured for transmitting the alert regarding the motion to a mobile communications device of a user associated with the vehicle. In another embodiment, such instructions can be further configured for transmitting back a response from the user regarding the alert to indicate whether the user authorized the motion. In another embodiment, such instructions can be further configured for providing a link to a webpage associated with the theft notification service, wherein the webpage displays interactive data for verification, enforcement, and prosecution use by civil authorities.
  • a processor-readable medium storing computer code representing instructions to cause a process for preventing vehicle theft.
  • Such computer code can include code, for example: capture a video stream of a parking area wherein a vehicle is parked, the video stream provided by a theft notification service to which the vehicle is pre-registered, identify the vehicle in the video stream, analyze the video stream to detect a motion with respect to the vehicle, and generate an alert if the motion is detected.
  • such code can further comprise code to register the vehicle with the theft notification service via a computing device, and identify the vehicle in the video stream using information provided by the registering of the vehicle with the theft notification service.
  • such code can further include code to transmit the alert regarding the motion to a mobile communications device of a user associated with the vehicle, and transmit back a response from the user regarding the alert to indicate whether the user authorized the motion.

Abstract

Methods and systems for preventing vehicle theft. A video stream of a parking area wherein a vehicle is parked can be captured, the video stream provided by a theft notification service to which the vehicle is pre-registered. The vehicle in the video stream can be identified. The video stream is then analyzed to detect motion with respect to the vehicle. An alert can then be generated if motion is detected.

Description

FIELD OF THE INVENTION
Embodiments are generally related to the field of automatic anomaly detection. Embodiments also relate to the prevention of vehicle theft and vandalism. Embodiments are also related to video-based parking technologies. Embodiments further relate to parking management and transportation systems.
BACKGROUND
The security of a parking location is often a concern of a driver. The ability to detect vandalism or theft is thus of utmost concern when implementing parking management solutions.
Automobile theft detection and prevention is currently accomplished in a number of ways. For example, theft prevention systems can be installed in vehicles. The development of a vehicle security system for protecting a vehicle from theft while the vehicle is unattended in a parking position is typically the vehicle manufacturer's responsibility. Vehicle manufacturers' solutions typically involve adding hardware or a software component to the vehicle. As this increases the cost of the vehicle, not every vehicle is equipped with such a system.
Another solution involves simply parking in a secured location and asking someone to watch or attend to the vehicle. Access to information that shows which parking locations are safer than others, however, is not always available. Therefore, finding a secure site in which to park is not always possible and finding someone to watch a car is not necessarily cost effective based on the location, time of day, and length of time parked. This is particularly true when the parking location is on-street or curbside.
SUMMARY
The following summary is provided to facilitate an understanding of some of the innovative features unique to the disclosed embodiments and is not intended to be a full description. A full appreciation of the various aspects of the embodiments disclosed herein can be gained by taking the entire specification, claims, drawings, and abstract as a whole.
It is, therefore, one aspect of the disclosed embodiments to provide for a vehicle theft prevention and detection method and system.
It is another aspect of the disclosed embodiments to provide an improved video-based parking technology.
It is a further aspect of the disclosed embodiments to provide for a vehicle theft detection and notification system and/or service that can be offered to any vehicle in the operating range of the video parking system (whether the parking is free or not) and wherein driver(s) can subscribe (primarily via a smartphone/mobile device).
The aforementioned aspects and other objectives and advantages can now be achieved as described herein. Methods and systems for preventing vehicle theft are disclosed. A video stream of a parking area wherein a vehicle is parked can be captured, the video stream provided by a theft notification service to which the vehicle is pre-registered. The vehicle in the video stream can be identified. The video stream is then analyzed to detect motion with respect to the vehicle. An alert can then be generated if motion is detected.
Embodiments can be implemented in the context of an “app” or service that is capable of alerting someone parking on a city street that their car has been moved without their permission. This disclosed approach uses a mobile phone to allow a driver to register their vehicle for a theft notification system. A video camera mounted with a view of the parking area on a street captures video streams. A video processing system identifies objects (e.g., cars) and generates an alert when a car is moved without the user's acknowledgement, and the alert will be sent to the registered mobile device user. The driver can then notify police with the registered vehicle information if they think the car is being stolen. The police also can be sent the link for verification, enforcement, and prosecution. Enhancement to the system include mobile applications that display theft statistics and pricing.
BRIEF DESCRIPTION OF THE FIGURES
The accompanying figures, in which like reference numerals refer to identical or functionally-similar elements throughout the separate views and which are incorporated in and form a part of the specification, further illustrate the present invention and, together with the detailed description of the invention, serve to explain the principles of the present invention.
FIG. 1 illustrates a screenshot of an example parking “app” that can be implemented via a Smartphone or other computing device, in accordance with a preferred embodiment;
FIG. 2 illustrates screenshots of three respective GUI displays, which are also displayable via a Smartphone such as shown in FIG. 1, in accordance with a preferred embodiment;
FIG. 3 illustrates additional GUI's displaying different user options, in accordance with a preferred embodiment;
FIG. 4 illustrates example GUIs, which can be implemented with respect to the server side that takes the vehicle occupancy data from video detection data and compares it with the current occupancy data including the vehicles signed up with the theft and vandalism prevention service, in accordance with embodiment;
FIG. 5 illustrates example “app” GUI's, which can be implemented in accordance with an alternative embodiment;
FIG. 6 illustrates a high-level flow chart of operations depicting logical operational steps of a method for preventing theft, in accordance with a preferred embodiment;
FIG. 7 illustrates a high-level flow chart of operations depicting logical operational steps of a method for preventing theft, in accordance with an alternative embodiment;
FIG. 8 illustrates a schematic view of a computer system, which can be implemented in accordance with one or more of the disclosed embodiments; and
FIG. 9 illustrates a schematic view of a software system including an anomaly detection module, an operating system, and a user interface, in accordance with one or more embodiments.
DETAILED DESCRIPTION
The particular values and configurations discussed in these non-limiting examples can be varied and are cited merely to illustrate at least one embodiment and are not intended to limit the scope thereof.
The embodiments will now be described more fully hereinafter with reference to the accompanying drawings, in which illustrative embodiments of the invention are shown. The embodiments disclosed herein can be embodied in many different forms and should not be construed as limited to the embodiments set forth herein; rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the scope of the invention to those skilled in the art. Like numbers refer to like elements throughout. As used herein, the term “and/or” includes any and all combinations of one or more of the associated listed items. The term “vehicle” as utilized hereinafter includes, but is not limited to, for example, cars, trucks, trailers, motorcycles, bicycles, etc.
The disclosed embodiments utilize video-based parking technology to implement vehicle theft detection and prevention using elements of video based parking systems and smartphone/mobile device based applications. This service can be offered to any vehicle parked within the context of such a video based parking system. Advantages of this approach include: no additional HW/SW needs to be added to the vehicle itself, monitoring and detection of a wide variety of anomalous behavior can be achieved with no additional HW in the video based parking system, and many options for preventive action can be pursued because of the availability of live video that can be machine or human monitored in contrast to a simple “beeping horn” in a car-based system.
FIG. 1 illustrates a screenshot of an example parking “app” that can be implemented via a Smartphone or other computing device 10, in accordance with a preferred embodiment. The parking “app” can be part of an offering of a theft notification service. The “app” itself functions to find an available parking spot, to find an available parking spot with available theft notification service, and to notify a user of a potential theft related to his or her vehicle, as will be explained in greater detail herein. As shown in FIG. 1, a Smartphone 10 displays a GUI (Graphical User Interface) that can include, for example, graphically displayed maps and directions and in some situations, turn-by-turn directions to a particular destination 12 along with, for example, 2D satellite and 3D earth views; along with in some instances, photographic views of the turns, which show the real streets and surroundings. The data displayed via such a GUI can be derived from, for example, satellite mapping information and other geographical data. Note that as utilized herein the term “app” is an an abbreviation for “application”. An app is thus a piece of software. It can run on the Internet, on a computer, or on a mobile computing device or other electronic device.
FIG. 2 illustrates screenshots of three respective GUI displays 20, 30, and 40, which are also displayable via a Smartphone such as shown in FIG. 1, in accordance with a preferred embodiment. FIG. 2 thus demonstrates how a user can register his/her vehicle by inputting his/her vehicle's information. Thus, for example, GUI 20 includes an input field 22 for entering a username and an input field 24 for entering a password to access the parking app. Graphically displayed login button 26 and sign-up button 28 are also displayable via the GUI 20. To the right of GUI 20 is shown a subsequent GUI 30 that allows a user to enter additional account information into 32, 34, 36 after logging into the app via, for example, the login button 26. GUI 40 allows for the selection and/or identification of a number of different types of vehicle types (e.g., KIA, JAGUAR, etc.). Additional vehicle information (e.g., vehicle's color and model) can also be included in the registration process.
FIG. 3 illustrates additional GUI's 42, 43, and 60 displaying different user options, in accordance with a preferred embodiment. GUI 42, for example, offers a section 50 that displays user profile information including, for example, a parking status field 54 that displays parking information such as, for example “NOT PARKED.” A section 48 can display vehicle profile information, which may be entered and altered by the user. Submission of this information can occur via, for example, a submit button 44. The user can sign out via sign out button 46. GUI 43 displays information and options similar to that shown in GUI 42. In the example of GUI 43, the status identifier 54 indicates “PARKED” as opposed to “NOT PARKED” shown in GUI 42. GUI 60 permits a user to enter and/or view personal information 64 and registration information 62. Buttons 64 and 68 respectively allow a user to submit or cancel the entry or viewing of such information.
A variety of steps can be implemented for the vehicle stealing prevention technique discussed herein. Although the methodology disclosed herein generally relates to applications implemented via a Smartphone, it can be appreciated that they are also capable of being implemented via other computing devices such as desktop personal computers, laptop computers, “pad” computing devices (e.g., Android, Apple, etc.) as well as vehicle on-board wireless communication devices.
Thus, a user can sign up or login to the mobile parking application through a smartphone or other platform prior to parking as shown in FIG. 2 (e.g., see the login button 26 and the sign up button 28). Information can be provided to the user to guide the user to parking locations where parking is available and video security is an option. FIG. 1, for example, shows the mobile parking space finding application that can guide users to the appropriate parking spot. The safety and cost status for theft/vandalism can also be presented to reinforce the value of the option to the user. Information will be provided stating whether security is an option the client pays for or included automatically as part of the parking service and fees.
At the sign up step, the user's information such as vehicle type, vehicle color, license plate number, or the parking account number (if the user already has an account), etc., can be entered or retrieved from memory and populated in the application automatically. Many services paid or free are provided after login. Security monitoring is one such service.
Either before or after parking, the user is prompted to answer if he/she would like to have the vehicle theft and vandalism monitoring and prevention service added to their parking spot. If the user clicks “yes”, a unique ID code (such as the vehicle's license plate number or the parking account number) is created by the mobile parking application and sent to the server to register the vehicle and the services desired.
The service can be initiated when the car is parked in an appropriate location. The server with vehicle detection video analytics associates the code with the parking vehicle. Typically, the vehicle's GPS location and starting parking time are enough to distinguish the vehicle from its neighboring parked vehicles. Occasionally, when two vehicles come to park at about the same time and parked near each other, other information such as the vehicle's color and size will be used for this association. If the vehicle's license plate number is provided in the sign up step, and the video analytics is capable of detecting and recognizing license plate number (Ref. [5]), this association will be even easier.
After parking, the user is asked to confirm the “start of security” monitoring of the vehicle and, optionally, some confirming picture or info is presented to the user to confirm their vehicle is the proper one. During the length of the parking session the video feeds, which include the vehicle with the security option selected, are recorded for review if needed, and segmented and processed by video analytics including the theft detection software.
There are several ways to detect theft. For example, if the prevention code is still active while the vehicle is leaving the parking spot, the vehicle detection video analytics will detect the vehicle's movement and an alarm will be sent to the user's smartphone. The alert may include a question to ask the user whether the movement of his/her vehicle is authorized. If the user replies “yes”, no further action will be taken. If the user replies “no”, a theft event is detected.
Several actions can be configured to occur if a theft event is detected. For example, police contact information can be attached to the alarm so that the user can directly contact the police. Recorded videos are also available for police to review. In case of a false alarm, the user can “click” away the alarm to let the server know. The system can attempt several different mechanisms to contact the owner of the vehicle or item under secure observation in order to be robust vs. forgetting to turn off the security feature. After repeated alarms sent to the user without response, the server can initiate a call to police providing the location and vehicle information (maker, model, color, license plate number etc.) and a copy of the relevant video if desired by local police enforcement
When ending the parking session and the theft prevention service, the user can click a button from his/her smartphone to let the server know the end of the parking session. The server will de-activate the created theft and vandalism prevention code and turn off the service. To prevent the user accidentally hit the button, the de-activation may only be done when the smartphone is near the vehicle's location or an “are you sure” check before turning off the service is required.
This service can be provided either based on the parking time monitored (as the video parking technology is capable of determining parking time) or each parking session. It could have tiers of services based on machine monitoring, human monitoring, and the aggressiveness of the actions taken in response to a detected event.
While the focus of the disclosed embodiments are generally for a automobile's theft prevention, it is foreseeable to extend it to the same prevention for motorcycles, bicycles, etc., as the same steps above can be applied. Thus, the term “vehicle” as utilized herein can refer to a variety of vehicles such as automobiles, trucks, bicycles, motorcycles, etc.
The disclosed embodiments can be implemented in, for example, a smartphone parking application with real time parking availability data inputting from cameras. Parking space finding and reservation as well as automatic parking bill payment are some of the functions that can be incorporated into the “app”. Security applications can be added on top of these functions.
FIG. 3 illustrates how a registered user can park his/her vehicle and then get billed later with exact parking time. When the user parks his/her car, he/she is required to initiate a parking session by logging into the application and pressing the submit button. In doing so, his/her account information, time stamp as well as the GPS coordinates are transmitted to the central server. If the user signed up for the vehicle stealing prevention service, the code created as described above can be sent together with all the other information shown.
FIG. 4 illustrates example GUIs 70 and 72 which can be implemented with respect to the server side that takes the vehicle occupancy data from video detection data and compares it with the current occupancy data including the vehicles signed up with the theft prevention service, in accordance with embodiment. GUI's 70 and 72 illustrates a prototype of a web-based monitoring tool. The value “0” shown in the parking table of GUI 72 indicates that the vehicle does not have the theft prevention service and “1” means the prevention service is enabled (e.g., see the column labeled “Monitoring Service” in the parking table displayed via GUI 72).
FIG. 5 illustrates Smartphone app GUI's 74, 76, and 78, which can be implemented in accordance with an alternative embodiment. GUI 74 provides a filter for theft prevention monitoring service. When the filter in “on”, the user enabled the theft prevention and notification service. The user could select “off” even if he/she already registered with the theft prevention/notification service. GUI 76 indicates that when the car is detected to have left the parking spot without the user deactivating the prevention service, a notification can be sent to the user (e.g., “Your car has been moved” and “Did you forget to end your parking session?”). If the user selects “No”, a dial pad can be presented to the user as shown via GUI 78 so that the user can conveniently call the police or an appropriate emergency service.
FIG. 6 illustrates a high-level flow chart of operations depicting logical operational steps of a method 80 for preventing theft, in accordance with a preferred embodiment. As indicated at block 82, the process can be initiated. Thereafter, as shown at block 84, a server (e.g., a theft prevention/notification server) can receive a request for the theft prevention/notification service from a pre-registered vehicle user. The request can be generated from, e.g., the smartphone app by enabling the theft prevention/notification filter in GUI 74 to “on”. Next, as shown at block 86, a step or logical operation can be implemented for capturing a video stream of a parking area wherein a vehicle is parked, the video stream is provided by the cameras that are deployed on the street for the video-based parking technology. Then, as depicted at block 88, a step or logical operation can be implemented for identifying the vehicle in the video stream. Next, as described at block 90, a step or logical operation can be implemented for analyzing the video stream to detect a motion with respect to the identified vehicle. Thereafter, as shown at block 92, a step or logical operation can be implemented for generating an alert if the motion is detected. The process can then terminate, as shown at block 94.
FIG. 7 illustrates a high-level flow chart of operations depicting logical operational steps of a method 81 for preventing theft/vandalism, in accordance with an alternative embodiment. Note that the method 81 is similar to the method 80 shown in FIG. 6. Thus, the same method steps/logical operations 82 to 92 are shown in both FIGS. 6-7. In the interest of brevity, a description of such steps/logical operations will not be repeated. In FIG. 7, at block 96, a step or logical operation is depicted for allowing a server (e.g., a theft prevention/notification server) to receive the user response to the alert indicating whether the user authorizes the detected motion. If the user's response is not authorized, the next step or logical operation, as depicted by block 98, is to provide contact information of law enforcement agents together with other vehicle information that helps stopping the theft. The process then terminates, as shown at block 100.
The embodiments are described at least in part herein with reference to flowchart illustrations and/or block diagrams of methods, systems, and computer program products and data structures according to embodiments of the invention. For example, FIGS. 1, 2, 3, and 5 demonstrate screenshots from a Smartphone or mobile computing device “app.” FIG. 4 demonstrates one example of a management tool offered by a theft prevention/notification server. FIGS. 6-7 illustrates operational/logical steps and/or instructions of methods 80, 81. It will be understood that each block of the illustrations, and combinations of blocks, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general-purpose computer, special purpose computer, or other programmable data-processing apparatus to produce a machine such that the instructions, which execute via the processor of the computer or other programmable data-processing apparatus, create means for implementing the functions/acts specified in the block or blocks discussed herein such as, for example, the various instructions discussed and shown with respect to the figures herein.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data-processing apparatus to function in a particular manner such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function/act specified in the block or blocks.
The computer program instructions may also be loaded onto a computer or other programmable data-processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions/acts specified in the block or blocks.
FIGS. 8-9 are provided as exemplary diagrams of data-processing environments in which embodiments of the present invention may be implemented. It should be appreciated that FIGS. 8-9 are only exemplary and are not intended to assert or imply any limitation with regard to the environments in which aspects or embodiments of the disclosed embodiments may be implemented. Many modifications to the depicted environments may be made without departing from the spirit and scope of the disclosed embodiments. Note that FIGS. 8-9 generally illustrate a data-processing system in which embodiments may be implemented (e.g., such as an “app”). FIGS. 8-9 are thus representative of a variety of different types of data-processing systems and devices including, for example, servers, laptop computers, Smartphones, “pad” or tablet computing devices, desktop computers, and other computing devices.
As illustrated in FIG. 8, the disclosed embodiments may be implemented in the context of a data-processing system 300 that can include, for example, a central processor 301 (or other processors), a main memory 302, a controller 303, and in some embodiments, a USB (Universal Serial Bus) 304 or other appropriate peripheral connection. System 300 can also include an input device 305 (e.g., a keyboard, pointing device such as a mouse, etc.), a display 306, and a HDD (Hard Disk Drive) 307 (e.g., mass storage). As illustrated, the various components of data-processing system 300 can communicate electronically through a system bus 310 or similar architecture. The system bus 310 may be, for example, a subsystem that transfers data between, for example, computer components within data-processing system 300 or to and from other data-processing devices, components, computers, etc.
FIG. 9 illustrates a computer software system 350, which may be employed for directing the operation of the data-processing system 300 depicted in FIG. 8. Software application 354 can be stored in memory 302 and/or on HDD 307, and generally can include a module 352 and can be associated with a kernel or operating system 351 and a shell or interface 353. One or more application programs, such as module(s) 352, may be “loaded” (i.e., transferred from mass storage or HDD 307 into the main memory 302) for execution by the data-processing system 300. In the example shown in FIG. 9, module 352 can be implemented as, for example, a software module that can perform the logical instructions or operations of FIGS. 6-7 and so forth.
The data-processing system 300 can receive user commands and data through user interface 353 accessible by a user 349. These inputs may then be acted upon by the data-processing system 300 in accordance with instructions from operating system 351 and/or software application 354 and any software module(s) 352 thereof.
The discussion herein is thus intended to provide a brief, general description of suitable computing environments in which the system and method may be implemented. Although not required, the disclosed embodiments will be described in the general context of computer-executable instructions such as program modules being executed by a single computer. In most instances, a “module” constitutes a software application.
Generally, program modules (e.g., module 352) can include, but are not limited to, routines, subroutines, software applications, programs, objects, components, data structures, etc., that perform particular tasks or implement particular abstract data types and instructions. Moreover, those skilled in the art will appreciate that the disclosed method and system may be practiced with other computer system configurations such as, for example, hand-held devices, multi-processor systems, data networks, microprocessor-based or programmable consumer electronics, networked personal computers, minicomputers, mainframe computers, servers, and the like.
Note that the term module as utilized herein may refer to a collection of routines and data structures that perform a particular task or implements a particular abstract data type. Modules may be composed of two parts: an interface, which lists the constants, data types, variable, and routines that can be accessed by other modules or routines, and an implementation, which is typically private (accessible only to that module) and which includes source code that actually implements the routines in the module. The term module may also simply refer to an application such as a computer program designed to assist in the performance of a specific task such as word processing, accounting, inventory management, etc.
The interface 353 (e.g., a graphical user interface) can serve to display results, whereupon a user may supply additional inputs or terminate a particular session. In some embodiments, operating system 351 and interface 353 can be implemented in the context of a “windows” system. It can be appreciated, of course, that other types of systems are possible. For example, rather than a traditional “windows” system, other operation systems such as, for example, a real time operating system (RTOS) more commonly employed in wireless systems may also be employed with respect to operating system 351 and interface 353.
FIGS. 8-9 are thus intended as examples and not as architectural limitations of disclosed embodiments. Additionally, such embodiments are not limited to any particular application or computing or data-processing environment. Instead, those skilled in the art will appreciate that the disclosed approach may be advantageously applied to a variety of systems and application software. Moreover, the disclosed embodiments can be embodied on a variety of different computing platforms including Macintosh, Unix, Linux, and the like.
Based on the foregoing, it can be appreciated that a number of embodiments, preferred and alternative, are disclosed herein. For example, in one embodiment, a method for preventing vehicle theft can be implemented. Such a method can include the steps or logical operations of capturing a video stream of a parking area wherein a vehicle is parked, the video stream provided by a theft notification service to which the vehicle is pre-registered; identifying the vehicle in the video stream, analyzing the video stream to detect a motion with respect to the vehicle, and generating an alert if the motion is detected. Such a vehicle can be, for example, an automobile, motorcycle, a motorized scooter, bicycle, etc.
In another embodiment, a step or logical operation can be provided for registering the vehicle with the theft notification service via a computing device. In yet another embodiment, a step or logical operation can be provided for identifying the vehicle in the video stream using information provided by the registering of the vehicle with the theft notification service. In still another embodiment, a step or logical operation can be provided for transmitting the alert regarding the motion to a mobile communications device of a user associated with the vehicle.
In another embodiment, a step or logical operation can be provided for transmitting back a response from the user regarding the alert to indicate whether the user authorized the motion. In yet another embodiment, a step or logical operation can be provided for providing a link to a webpage associated with the theft notification service, wherein the webpage displays interactive data for verification, enforcement, and prosecution use by civil authorities. In some embodiments, the aforementioned motion can constitute an unauthorized movement of the vehicle.
In another embodiment, a system for preventing vehicle theft can be implemented. Such a system can include, for example, a processor, a data bus coupled to the processor, and a computer-usable medium embodying computer program code, the computer-usable medium being coupled to the data bus. Such computer program code can include instructions executable by the processor and configured, for example, for capturing a video stream of a parking area wherein a vehicle is parked, the video stream provided by a theft notification service to which the vehicle is pre-registered, identifying the vehicle in the video stream, analyzing the video stream to detect a motion with respect to the vehicle, and generating an alert if the motion is detected.
In another embodiment, such instructions can be further configured for registering the vehicle with the theft notification service via a computing device. In yet another embodiment, such instructions can be further configured for identifying the vehicle in the video stream using information provided by the registering of the vehicle with the theft notification service. In still another embodiment, such instructions can be further configured for transmitting the alert regarding the motion to a mobile communications device of a user associated with the vehicle. In another embodiment, such instructions can be further configured for transmitting back a response from the user regarding the alert to indicate whether the user authorized the motion. In another embodiment, such instructions can be further configured for providing a link to a webpage associated with the theft notification service, wherein the webpage displays interactive data for verification, enforcement, and prosecution use by civil authorities.
In another embodiment, a processor-readable medium storing computer code representing instructions to cause a process for preventing vehicle theft, can be implemented. Such computer code can include code, for example: capture a video stream of a parking area wherein a vehicle is parked, the video stream provided by a theft notification service to which the vehicle is pre-registered, identify the vehicle in the video stream, analyze the video stream to detect a motion with respect to the vehicle, and generate an alert if the motion is detected.
In some embodiments, such code can further comprise code to register the vehicle with the theft notification service via a computing device, and identify the vehicle in the video stream using information provided by the registering of the vehicle with the theft notification service. In another embodiment, such code can further include code to transmit the alert regarding the motion to a mobile communications device of a user associated with the vehicle, and transmit back a response from the user regarding the alert to indicate whether the user authorized the motion.
It will be appreciated that variations of the above-disclosed and other features and functions, or alternatives thereof, may be desirably combined into many other different systems or applications. Also, that various presently unforeseen or unanticipated alternatives, modifications, variations or improvements therein may be subsequently made by those skilled in the art which are also intended to be encompassed by the following claims.

Claims (16)

What is claimed is:
1. A method for preventing vehicle theft, the method comprising:
receiving user registration information from a user wherein the registration information comprises a user identifier and a password;
receiving vehicle identification information from the user wherein the vehicle identification information identifies a vehicle;
storing the vehicle identification information in association with the user registration information;
accepting a request from the user that the vehicle be monitored, wherein the vehicle is parked in a parking area, wherein at least one camera monitors the parking area, wherein the at least one camera produces at least at least one video stream, and wherein the vehicle is visible in at least one of the at least one video stream;
receiving the at least one video stream;
identifying the vehicle in the at least one video stream;
analyzing the at least one video stream to detect a movement of the vehicle; and
sending the user an alert because of the movement of the vehicle wherein the alert informs the user that the vehicle moved.
2. The method of claim 1 wherein the vehicle is a bicycle.
3. The method of claim 1 further comprising receiving the vehicle identification information from a computing device wherein the user provides the vehicle identification information via the computing device.
4. The method of claim 3 further comprising identifying the vehicle in the at least one video stream by using the vehicle identification information.
5. The method of claim 1 further comprising sending the alert to a mobile communications device wherein the user receives the alert from the mobile communications device.
6. The method of claim 5 further comprising accepting a response from the mobile communications device wherein the response indicates that the user authorized the movement.
7. The method of claim 1 further comprising providing a link to a webpage wherein the webpage displays interactive data for verification, enforcement, and prosecution use by civil authorities.
8. The method of claim 1 further comprising:
accepting a response from the mobile communications device wherein the response indicates that the user did not authorized the movement; and
providing the user with theft information wherein the user provides the theft information to law enforcement authorities to thereby report a theft.
9. A system for preventing vehicle theft, the system comprising:
a processor;
a data bus coupled to the processor; and
a computer-usable medium embodying computer program code, the computer-usable medium being coupled to the data bus, the computer program code comprising instructions executable by the processor and configured for:
receiving user registration information from a user wherein the registration information comprises a user identifier and a password;
receiving vehicle identification information from the user wherein the vehicle identification information identifies a vehicle;
storing the vehicle identification information in association with the user registration information;
accepting a request from the user that the vehicle be monitored, wherein the vehicle is parked in a parking area, wherein at least one camera monitors the parking area, wherein the at least one camera produces at least at least one video stream, and wherein the vehicle is visible in at least one of the at least one video stream;
receiving the at least one video stream;
identifying the vehicle in the at least one video stream;
analyzing the at least one video stream to detect a movement of the vehicle; and
sending the user an alert because of the movement of the vehicle wherein the alert informs the user that the vehicle moved.
10. The system of claim 9 wherein the vehicle is a bicycle.
11. The system of claim 9, the instructions further configured for receiving the vehicle identification information from a computing device.
12. The system of claim 11 wherein the vehicle is identified using the vehicle identification information.
13. The system of claim 9 wherein the instructions are further configured for:
accepting device information wherein the device information specifies a mobile communications device; and
sending the alert to the mobile communications device.
14. The system of claim 13 wherein the instructions are further configured for accepting a response from the mobile communications device wherein the response indicates that the movement is authorized.
15. The system of claim 9 wherein the instructions are further configured for providing a link to a webpage wherein the webpage provides evidence of a theft.
16. The system of claim 9 wherein the instructions are further configured for:
accepting a response from a mobile communications device wherein the response indicates that the movement is not authorized; and
providing the user with theft information evidencing a theft.
US13/944,177 2013-07-17 2013-07-17 Methods and systems for vehicle theft detection and prevention using a smartphone and video-based parking technology Active 2037-07-16 US10384642B2 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US13/944,177 US10384642B2 (en) 2013-07-17 2013-07-17 Methods and systems for vehicle theft detection and prevention using a smartphone and video-based parking technology

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US13/944,177 US10384642B2 (en) 2013-07-17 2013-07-17 Methods and systems for vehicle theft detection and prevention using a smartphone and video-based parking technology

Publications (2)

Publication Number Publication Date
US20150022663A1 US20150022663A1 (en) 2015-01-22
US10384642B2 true US10384642B2 (en) 2019-08-20

Family

ID=52343286

Family Applications (1)

Application Number Title Priority Date Filing Date
US13/944,177 Active 2037-07-16 US10384642B2 (en) 2013-07-17 2013-07-17 Methods and systems for vehicle theft detection and prevention using a smartphone and video-based parking technology

Country Status (1)

Country Link
US (1) US10384642B2 (en)

Families Citing this family (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10102587B1 (en) * 2014-07-21 2018-10-16 State Farm Mutual Automobile Insurance Company Methods of pre-generating insurance claims
CN105898207B (en) * 2015-01-26 2019-05-10 杭州海康威视数字技术股份有限公司 The intelligent processing method and system of video data
ITUB20152636A1 (en) * 2015-07-30 2015-10-30 Net And Security S A S Di Landriscina Domenico & C PROCEDURE FOR READING THEFT OF VEHICLES FROM A PARKING AREA
US20190008859A1 (en) 2015-08-21 2019-01-10 Acerta Pharma B.V. Therapeutic Combinations of a MEK Inhibitor and a BTK Inhibitor
DE102015225793B4 (en) * 2015-12-17 2017-07-06 Volkswagen Aktiengesellschaft Method for preventing deactivation of online services in a vehicle
US10021354B2 (en) * 2016-02-17 2018-07-10 Siemens Industry, Inc. Electric vehicle charging station with integrated camera
DE102016209679A1 (en) 2016-06-02 2017-12-07 Ford Global Technologies, Llc A method of preventing vehicle theft
US10696212B2 (en) * 2017-01-13 2020-06-30 Jeffrey B. Cook Helmet lighting system and related method for monitoring vehicle status
US10382579B2 (en) * 2017-02-28 2019-08-13 International Business Machines Corporation Personalized location-based services for users
RU2668770C1 (en) * 2017-05-17 2018-10-02 Дмитрий Юрьевич Парфенов Method for finding a stolen vehicle
US10867518B2 (en) * 2017-08-31 2020-12-15 Ubicquia Iq Llc Method and system for identifying location of a parked vehicle
US11439870B2 (en) * 2018-12-06 2022-09-13 International Business Machines Corporation Equipment use tracking and availability prediction
CN110867041B (en) * 2019-10-31 2023-07-18 上海水业设计工程有限公司 System and method for analyzing crime of stolen non-motor vehicle based on video analysis
US11807188B2 (en) * 2021-01-14 2023-11-07 Toyota Motor Engineering & Manufacturing North America, Inc. Methods and systems for controlling image capture sessions with external devices
US11546734B2 (en) * 2021-05-17 2023-01-03 Ford Global Technologies, Llc Providing security via vehicle-based surveillance of neighboring vehicles

Citations (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0602765A2 (en) 1992-12-18 1994-06-22 PROTECT & DEFEND, Inc. Vehicle security system including an anti-carjacking system
US6002326A (en) 1994-09-19 1999-12-14 Valerie Turner Automotive vehicle anti-theft and anti-vandalism and anti-carjacking system
US6150927A (en) 1998-03-30 2000-11-21 Nextbus Information Systems, Llc Anti-vandalism detector and alarm system
US7382244B1 (en) * 2007-10-04 2008-06-03 Kd Secure Video surveillance, storage, and alerting system having network management, hierarchical data storage, video tip processing, and vehicle plate analysis
US7397358B2 (en) 2004-07-28 2008-07-08 Aftercad Software Inc. Method and system for location-centric information retrieval from wireless devices using RFID coding
US20090040307A1 (en) 2005-06-30 2009-02-12 Planum Vision Ltd. Surveillance System and Method for Detecting Forbidden Movement along a Predetermined Path
US20090262189A1 (en) * 2008-04-16 2009-10-22 Videoiq, Inc. Energy savings and improved security through intelligent lighting systems
US20090309709A1 (en) * 2008-02-25 2009-12-17 Recovery Systems Holdings, Llc Vehicle Security And Monitoring System
US7772967B2 (en) 2005-03-15 2010-08-10 Toyota Jidosha Kabushiki Kaisha Crime prevention device for vehicle
US7801507B2 (en) 2006-12-08 2010-09-21 Alcatel-Lucent Usa Inc. Increased automobile security via use of wireless network
US7893848B2 (en) 2003-09-03 2011-02-22 Stratech Systems Limited Apparatus and method for locating, identifying and tracking vehicles in a parking area
EP2384958A1 (en) 2010-05-07 2011-11-09 Guido Giovanni Locati Parking structure for bicycles
USRE42915E1 (en) 1998-07-10 2011-11-15 Toyota Jidosha Kabushiki Kaisha Vehicle security control apparatus
USRE43891E1 (en) 2006-04-05 2013-01-01 Larry Golden Multi sensor detection, stall to stop and lock disabling system
US8392118B2 (en) * 2007-06-21 2013-03-05 Harris KORN System and method for locating a vehicle
US8451331B2 (en) 2007-02-26 2013-05-28 Christopher L. Hughes Automotive surveillance system

Patent Citations (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0602765A2 (en) 1992-12-18 1994-06-22 PROTECT & DEFEND, Inc. Vehicle security system including an anti-carjacking system
US6002326A (en) 1994-09-19 1999-12-14 Valerie Turner Automotive vehicle anti-theft and anti-vandalism and anti-carjacking system
US6150927A (en) 1998-03-30 2000-11-21 Nextbus Information Systems, Llc Anti-vandalism detector and alarm system
USRE42915E1 (en) 1998-07-10 2011-11-15 Toyota Jidosha Kabushiki Kaisha Vehicle security control apparatus
US7893848B2 (en) 2003-09-03 2011-02-22 Stratech Systems Limited Apparatus and method for locating, identifying and tracking vehicles in a parking area
US7397358B2 (en) 2004-07-28 2008-07-08 Aftercad Software Inc. Method and system for location-centric information retrieval from wireless devices using RFID coding
US7772967B2 (en) 2005-03-15 2010-08-10 Toyota Jidosha Kabushiki Kaisha Crime prevention device for vehicle
US20090040307A1 (en) 2005-06-30 2009-02-12 Planum Vision Ltd. Surveillance System and Method for Detecting Forbidden Movement along a Predetermined Path
USRE43891E1 (en) 2006-04-05 2013-01-01 Larry Golden Multi sensor detection, stall to stop and lock disabling system
US7801507B2 (en) 2006-12-08 2010-09-21 Alcatel-Lucent Usa Inc. Increased automobile security via use of wireless network
US8451331B2 (en) 2007-02-26 2013-05-28 Christopher L. Hughes Automotive surveillance system
US8392118B2 (en) * 2007-06-21 2013-03-05 Harris KORN System and method for locating a vehicle
US7737837B2 (en) 2007-10-04 2010-06-15 Kd Secure Llc Hierarchical data storage manager, anonymous tip processing engine, and a vehicle information processing engine for security and safety applications
US7382244B1 (en) * 2007-10-04 2008-06-03 Kd Secure Video surveillance, storage, and alerting system having network management, hierarchical data storage, video tip processing, and vehicle plate analysis
US8115656B2 (en) 2008-02-25 2012-02-14 Recovery Systems Holdings, Llc Vehicle security and monitoring system
US20090309709A1 (en) * 2008-02-25 2009-12-17 Recovery Systems Holdings, Llc Vehicle Security And Monitoring System
US20090262189A1 (en) * 2008-04-16 2009-10-22 Videoiq, Inc. Energy savings and improved security through intelligent lighting systems
EP2384958A1 (en) 2010-05-07 2011-11-09 Guido Giovanni Locati Parking structure for bicycles

Non-Patent Citations (16)

* Cited by examiner, † Cited by third party
Title
U.S. Appl. No. 13/441,253, filed Apr. 6, 2012, Bulan et al.
U.S. Appl. No. 13/441,269, filed Apr. 6, 2012, Bulan et al.
U.S. Appl. No. 13/441,294, filed Apr. 6, 2012, Bernal.
U.S. Appl. No. 13/461,161, filed May 1, 2012, Fan et al.
U.S. Appl. No. 13/461,191, filed May 1, 2012, Wang et al.
U.S. Appl. No. 13/461,221, filed May 1, 2012, Bulan et al.
U.S. Appl. No. 13/461,266, filed May 1, 2012, Bulan et al.
U.S. Appl. No. 13/684,817, filed Nov. 26, 2012, Wang et al.
U.S. Appl. No. 13/835,386, filed Mar. 15, 2013, Bulan et al.
U.S. Appl. No. 13/836,310, filed Mar. 15, 2013, Wu et al.
U.S. Appl. No. 13/861,553, filed Apr. 12, 2013, Bulan et al.
U.S. Appl. No. 13/913,606, filed Jun. 10, 2013, Wu et al.
U.S. Appl. No. 13/918,364, filed Jun. 14, 2013, Wang et al.
U.S. Appl. No. 13/920,361, filed Jun. 18, 2013, Wang et al.
U.S. Appl. No. 13/922,091, filed Jun. 19, 2013, Bulan et al.
U.S. Appl. No. 13/935,605, filed Jul. 5, 2013, Wang et al.

Also Published As

Publication number Publication date
US20150022663A1 (en) 2015-01-22

Similar Documents

Publication Publication Date Title
US10384642B2 (en) Methods and systems for vehicle theft detection and prevention using a smartphone and video-based parking technology
US9802571B2 (en) Method and system for vandalism and/or loitering detection using video
US20240109514A1 (en) Recording video of an operator and a surrounding visual field
US20200312137A1 (en) Method and apparatus for enhancing driver situational awareness
US11069257B2 (en) System and method for detecting a vehicle event and generating review criteria
US9530310B2 (en) Method and system for detecting and tracking a vehicle of interest utilizing a network of traffic image-capturing units
US11051127B2 (en) Communications hub for crash event detection, response, and reporting system
CN105590454B (en) The method and its system that a kind of rule-breaking vehicle behavior is put to the proof
CN106710291B (en) Parking space obtaining method and device for parking lot
US9323993B2 (en) On-street parking management methods and systems for identifying a vehicle via a camera and mobile communications devices
US8970699B2 (en) Methods and systems for automobile security monitoring
US20160099927A1 (en) Hacker security solution for package transfer to and from a vehicle
WO2012174590A1 (en) Digital identification device for vehicles
US20150221140A1 (en) Parking and tollgate payment processing based on vehicle remote identification
US20140372155A1 (en) System and method for parking reservation and finding parking space suitable for user's vehicle size
US11205313B2 (en) Physical lock electronic interface tool
US20150154669A1 (en) Actual time based parking management methods, systems and processor-readable media
US20150356792A1 (en) Managing a vehicle incident
CN109671270B (en) Driving accident processing method and device and storage medium
US20150102946A1 (en) System and method for enforcing parking rules
US20150085129A1 (en) Portable occupancy detection methods, systems and processor-readable media
EP3399494A1 (en) Control method, control apparatus and control system of using an article, and article
US20170053250A1 (en) Mobile method for preparing vehicle towing fees
WO2018187967A1 (en) Apparatus, server and method for vehicle sharing
Arellano-Zubiate et al. Design of an Anti-theft Alarm System for Vehicles using IoT

Legal Events

Date Code Title Description
AS Assignment

Owner name: XEROX CORPORATION, CONNECTICUT

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:WANG, YAO RONG;FURST, MICHAEL;CHANAWANGSA, PANYA;SIGNING DATES FROM 20130711 TO 20130715;REEL/FRAME:030815/0986

AS Assignment

Owner name: CONDUENT BUSINESS SERVICES, LLC, TEXAS

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:XEROX CORPORATION;REEL/FRAME:041542/0022

Effective date: 20170112

STCV Information on status: appeal procedure

Free format text: BOARD OF APPEALS DECISION RENDERED

STPP Information on status: patent application and granting procedure in general

Free format text: NOTICE OF ALLOWANCE MAILED -- APPLICATION RECEIVED IN OFFICE OF PUBLICATIONS

STPP Information on status: patent application and granting procedure in general

Free format text: PUBLICATIONS -- ISSUE FEE PAYMENT VERIFIED

STCF Information on status: patent grant

Free format text: PATENTED CASE

AS Assignment

Owner name: JPMORGAN CHASE BANK, N.A., NEW YORK

Free format text: SECURITY AGREEMENT;ASSIGNOR:CONDUENT BUSINESS SERVICES, LLC;REEL/FRAME:052189/0698

Effective date: 20200318

AS Assignment

Owner name: CONDUENT HEALTH ASSESSMENTS, LLC, NEW JERSEY

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:JPMORGAN CHASE BANK, N.A.;REEL/FRAME:057969/0180

Effective date: 20211015

Owner name: CONDUENT CASUALTY CLAIMS SOLUTIONS, LLC, NEW JERSEY

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:JPMORGAN CHASE BANK, N.A.;REEL/FRAME:057969/0180

Effective date: 20211015

Owner name: CONDUENT BUSINESS SOLUTIONS, LLC, NEW JERSEY

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:JPMORGAN CHASE BANK, N.A.;REEL/FRAME:057969/0180

Effective date: 20211015

Owner name: CONDUENT COMMERCIAL SOLUTIONS, LLC, NEW JERSEY

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:JPMORGAN CHASE BANK, N.A.;REEL/FRAME:057969/0180

Effective date: 20211015

Owner name: ADVECTIS, INC., GEORGIA

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:JPMORGAN CHASE BANK, N.A.;REEL/FRAME:057969/0180

Effective date: 20211015

Owner name: CONDUENT TRANSPORT SOLUTIONS, INC., NEW JERSEY

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:JPMORGAN CHASE BANK, N.A.;REEL/FRAME:057969/0180

Effective date: 20211015

Owner name: CONDUENT STATE & LOCAL SOLUTIONS, INC., NEW JERSEY

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:JPMORGAN CHASE BANK, N.A.;REEL/FRAME:057969/0180

Effective date: 20211015

Owner name: CONDUENT BUSINESS SERVICES, LLC, NEW JERSEY

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:JPMORGAN CHASE BANK, N.A.;REEL/FRAME:057969/0180

Effective date: 20211015

AS Assignment

Owner name: BANK OF AMERICA, N.A., NORTH CAROLINA

Free format text: SECURITY INTEREST;ASSIGNOR:CONDUENT BUSINESS SERVICES, LLC;REEL/FRAME:057970/0001

Effective date: 20211015

Owner name: U.S. BANK, NATIONAL ASSOCIATION, CONNECTICUT

Free format text: SECURITY INTEREST;ASSIGNOR:CONDUENT BUSINESS SERVICES, LLC;REEL/FRAME:057969/0445

Effective date: 20211015

MAFP Maintenance fee payment

Free format text: PAYMENT OF MAINTENANCE FEE, 4TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1551); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

Year of fee payment: 4